Analysis
-
max time kernel
130s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
26-05-2023 11:40
Static task
static1
Behavioral task
behavioral1
Sample
b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe
Resource
win10v2004-20230220-en
General
-
Target
b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe
-
Size
7.0MB
-
MD5
88b3599db217d1ee471f50f8d4e45f41
-
SHA1
464a9acae2c65f21ecc094ef0085b9d16f973d09
-
SHA256
b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65
-
SHA512
73f965b779e9a3fb5005ffdd0d895aed535f03f4369ca3c9b1593d28ffff79083739ddb2bb766255690dea58af70a09a7b194d8b82c1171ba8680af75026a858
-
SSDEEP
98304:O0fXQs0DabGj5HiocbOiKdErEtZWFU88B2Z0vYVtsEb04kKvo+qtUAEmY0yMG3I8:aDaahiWieEr3UdvqbDo20yMrg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Documentsssh-YZ18.5.8.6.exepid process 796 Documentsssh-YZ18.5.8.6.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Software\Microsoft\Windows\CurrentVersion\Run b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe Set value (str) \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Documentsssh-YZ18.5.8.6 = "C:\\ProgramData\\Documentsssh-YZ18.5.8.6\\Documentsssh-YZ18.5.8.6.exe" b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exedescription pid process target process PID 4324 wrote to memory of 796 4324 b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe Documentsssh-YZ18.5.8.6.exe PID 4324 wrote to memory of 796 4324 b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe Documentsssh-YZ18.5.8.6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe"C:\Users\Admin\AppData\Local\Temp\b66484a5f8b1f41a9508411f2078b8ea69cdb1973635dc3a2a2831ff3767ba65.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\Documentsssh-YZ18.5.8.6\Documentsssh-YZ18.5.8.6.exeC:\ProgramData\Documentsssh-YZ18.5.8.6\Documentsssh-YZ18.5.8.6.exe2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Documentsssh-YZ18.5.8.6\Documentsssh-YZ18.5.8.6.exeFilesize
757.0MB
MD5d8b63fd83c93f47b9d8dd4b906dbb308
SHA1a692b52cbc296e0e794a575fef7884fcffa13692
SHA256ce5d5b0a08e8bba34d5010665d3c54f094830f2a5262e76544ba7c92cfbaac6f
SHA512bf6089715db94948e9891db7c72a98b2b2801939bfceedfc30f9b13cce67d187d4db4225a1096fd015cdadad9f969a8d227a9279116c4fbc216dfab40de75be1
-
C:\ProgramData\Documentsssh-YZ18.5.8.6\Documentsssh-YZ18.5.8.6.exeFilesize
757.0MB
MD5d8b63fd83c93f47b9d8dd4b906dbb308
SHA1a692b52cbc296e0e794a575fef7884fcffa13692
SHA256ce5d5b0a08e8bba34d5010665d3c54f094830f2a5262e76544ba7c92cfbaac6f
SHA512bf6089715db94948e9891db7c72a98b2b2801939bfceedfc30f9b13cce67d187d4db4225a1096fd015cdadad9f969a8d227a9279116c4fbc216dfab40de75be1
-
memory/796-138-0x00007FF6148F0000-0x00007FF614FF0000-memory.dmpFilesize
7.0MB
-
memory/4324-133-0x00007FF604160000-0x00007FF604860000-memory.dmpFilesize
7.0MB